China is the E-Waste Computer dump for the world

Guiyu computer dump –

1. The Electronics Junkyard Dismantlers of Guiyu

    2008 Guiyu was once a peaceful rice-growing village located in the eastern province of Guangdong, southern China – that is – until a surge of broken computers and laptops arrived from the Western World. Since then, Guiyu has been proclaimed the World’s electronic-waste capital. For around $1.50 USD, around 60,000 local workers including children risk their lives and limbs to scramble for anything of value out of your old computer. Some workers go the river bank, located just outside the village, where they make small fires to heat an extremely toxic mixture dubbed Aqua Regia. It contains 75 per cent pure Hydrochloric Acid and 25 per cent pure Nitric acid. Using the mixture, workers try to extract the small amount of gold found within a number of electronic parts such as computer chips. This method is extremely harmful both to humans and environment, as it produces sulfur dioxide and chlorine. At best, protection comes in the form of only a pair of rubber boots or a pair of gloves; but many of the workers endure a day’s labor without any protection at all.

2. Much toxic computer waste lands in Third World

    “25 Feb 2002 … (AP) — What happened to that old computer after you sold it to a … That often involves operations like the dump in Guiyu or similar ones …”

3. The Seattle Times: Nation & World: E-waste dump of the world

    “9 Apr 2006 … A worker piles discarded aluminum computer casings on the back of a motorized transport at the town of Guiyu in southern China. …”

4. Electronic waste in Guiyu – Wikipedia

    “While taping part of the story onsite at an illegal recycling dump in Guiyu, representatives of the Chinese recyclers attempted without success to …”

5. E-Waste Not How–and why–we should make sure our old cell phones, TVs and PCs get dismantled properly

    “Even though holiday sales were down at least 2% from 2007, millions of Americans awoke Christmas morning to new computers, TVs and iPhones. (I didn’t, but thanks for the pens, Mom.) Many of those gifts were replacements or upgrades, which prompts the question, What should you do with your old cell phone and other electronic equipment?

6. KILLER Digital Dumping Grounds on Earth, in Agbogbloshie, Ghana …

    “23 Jul 2009 … BIGGEST Military Computer Hacking of ALL-TIME, from a normal …. The southern Chinese city of Guiyu has been completely built around the e-waste trade. … and maybe one day put the digital dumps out of business. …” http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html

7. Journal of Material Cycles and Waste Management March 2006, Volume 8, Issue 1, pp 21-33 Environmental contamination from electronic waste recycling at …

    ” dismantling electronic equipment, selling computer … roller dump site. A reservoir located in the northern part of. Guiyu, approximately 6km from the …” http://www.springerlink.com/index/G8K452X2542HK200.pdf

8. 2007 Elevated blood lead levels of children in Guiyu, an Electronic …

    “Guiyu has become a hub for illegal and unsafe computer recycling. … Dump. One of the worst polluted spots is Guiyu, China, where the levels of dioxin, …”

9. “12 Nov 2007 … “A migrant child from Henan province holds up a piece of e-trash, once a computer screen bearing a “Nokia” logo in a junk yard in Guiyu in …”

10. The WIP Contributors: E-waste: America’s Electronics Feed the …

    “26 Apr 2009 … The landscape of Guiyu, a remote town in China’s Guangdong province, … piles of unrecyclable computer waste imported from around the world in Guiyu, China. … Nigeria to this nearby informal dump sitting on a swamp. …” http://www.thewip.net/contributors/2009/04/ewaste_americas_electronics_fe.html

11. Elevated Blood Lead Levels of Children in Guiyu, an Electronic …

    “Leaching of lead from computer printed wire boards and cathode ray tubes by … Johnson T. E-waste dump of the world. 2006. [[accessed 20 July 2006]]. …”

12. FOXNews.com – Chinese Recyclers Live in Toxic E-Waste Dump

    “Chinese Recyclers Live in Toxic E-Waste Dump, Southern city of Guiyu full of … wires to recover copper and cooking computer motherboards to release gold. …”

13. GARBAGE AND RECYCLING IN CHINA

    China produces 254 million tons of garage a year, or about a third of a kilogram per person per day—a third of the world’s annual trash and garbage output.

14. “2008 Following The Trail Of Toxic E-Waste
60 Minutes
is going to take you to one of the most toxic places on Earth — a place that government officials and gangsters don’t want you to see. It’s a town in China where you can’t breathe the air or drink the water, a town where the blood of the children is laced with lead. It’s worth risking a visit because, as correspondent Scott Pelley first reported last November, much of the poison is coming out of the homes, schools and offices of America.

15. E Waste

    “Burn houses in distance and smoke where computer parts from the United States are burned. … Guiyu is one of the biggest e-waste centers of the world. … Alaba market in Lagos, Nigeria to this nearby informal dump sitting on a swamp. …”

16. The World’s Electronic Waste Dump

Guiyu, China is often referred to as the “e-waste capital of the world.” The city employs over 150,000 electronic waste dis-assemblers, recyclers, and salvage workers who toil through 16-hour days tearing apart discarded computers and other electronic devices.

17. Where computers go to die — and kill | Salon News

    “10 Apr 2006 … Top: Woman in Guiyu, China, about to smash a cathode ray tube from a … A short distance inland, the trucks dump their loads in what looks like … rivers that have become dumping grounds for discarded computer parts. …”

http://www.salon.com/news/feature/2006/04/10/ewaste/

18. Elevated blood lead levels of children in Guiyu, an Electronic

    “RESULTS: BLLs in 165 children of Guiyu ranged from 4.40 to 32.67 ….. Leaching of lead from computer printed wire boards and cathode ray tubes by municipal solid waste “Municipal waste” redirects here. … E-waste dump of the world. …”
Posted in NetHappenings | Tagged , , , , , , , , , ,

Outlaw Crush Videos

What is a crush video?

Crush videos, also known as squish or trampling videos, cater to fetishists who gain sexual gratification from watching women torture and kill small animals by stepping on them.  Typically, those crushing will use their buttocks or feet, making this fetish popular amongst many foot fetishists, as crushing by feet is usually the main focus. The foot (barefoot or in shoes) is thus often idolized by someone with a crush fetish.  With the explosive growth of peer-to-peer file sharing networks, the availability and production of crush videos is already increasing dramatically.  Additionally, the increasing popularity of websites that thrive on displaying shocking and violent videos are putting more of these types of videos into the mainstream. “THE COVER UP

Rep. Elton Gallegly, (R-Calif.) and Rep. James P. Moran (D-Va.), co-chairmen of the Animal Protection Caucuswrote the law that would prohibit the interstate sale of images of animals being “intentionally crushed, burned, drowned or impaled” unless they have “religious, political, scientific, educational, journalistic, historic or artistic value.” Violations would be punishable by up to five years in prison, a fine of up to $10,000 or both. The bill says the prohibition would not apply to hunting videos.

The justices threw out the criminal conviction of Robert Stevens of Pittsville, Va., who was sentenced to three years in prison for videos he made about pit bull fights.

The Supreme Court has struck down a federal law designed to stop the sale and marketing of videos showing dogfights and other acts of animal cruelty, saying it is an unconstitutional violation of free speech. This is the second time this year the high court has tossed out federal legislation on free speech grounds. The justices in January nullified parts of a sweeping campaign finance reform law, giving corporations, unions, and advocacy groups more power to bankroll federal elections.

No Kill Animal Shelters

Posted in NetHappenings | Tagged , , , ,

A Critical Moment for the Future of the Internet | Techonomy

A Critical Moment for the Future of the Internet By Fadi Chehadé

The Internet, the greatest invention of our generation — several generations in fact — is in many ways a reflection of the American Dream. It’s vast and open, unlimited in its potential reach. It’s inclusive and welcoming. Anyone can be part of it and make a difference. The fastest growing part of the global economy is Internet-based, and the Internet accounts for a significant and growing portion of global GDP. According to Boston Consulting Group, the Internet is contributing up to 8 percent of GDP in some economies, powering growth and creating jobs.

You’d be correct in arguing it’s an American-made innovation. We can trace the roots of the Internet back some 50 years to a U.S. Defense Department research program. But as the Internet has expanded globally, it’s become increasingly clear that one government cannot lay claim to it. The Internet is a worldwide resource. It belongs to everyone.

Appropriately, the U.S. Government has long understood the Internet’s global potential. That’s why it helped create the Internet Corporation for Assigned Names and Numbers (ICANN) in 1998 — a neutral, independent and private-sector led organization designed to coordinate the Internet’s domain name system functions. Its operations are not made under the direction of one government, but through a bottom-up, multi-stakeholder policy development process involving business, civil society, engineers, academics, everyday users and many governments (around 150 of them participate). Under that system, the Internet has flourished, connecting over 3 billion of us, through our billions of devices.

Over the past two decades, the U.S. Government has gradually lightened its touch in its stewardship over the key Internet domain name system functions operated by ICANN. These technical functions are known as the Internet Assigned Numbers Authority (IANA) functions. The U.S. Government is now prepared to give up stewardship over the IANA functions altogether.

But why? And why now?

The U.S. Government always envisioned that its role in the IANA functions would be temporary. In March of 2014, the U.S. Commerce Department’s National Telecommunications and Information Administration (NTIA) announced its intent to transition out of its stewardship of the IANA functions. In its announcement, NTIA cited its belief that ICANN as an organization has matured and improved its accountability, transparency and its technical competence. NTIA also asserted that the Internet, managed and driven by the global community of diverse stakeholders, is in very good hands.

The current model of Internet governance is the only one that can keep pace with the global expansion of users, including where, how, how often and in what language they’re using it. Continual evolution is key: Internet governance must evolve to meet the changing needs of all users to ensure the network remains available, open, stable and secure. A report by Microsoft projects that the number of Internet users will grow to 4.7 billion in 2025, 75 percent of that growth coming from emerging economies. We must work together to take into consideration this changing landscape.

Many believe that if the U.S. Government does not step aside, other governments, including some that are uncomfortable with an open and inclusive Internet, will step in to try to capture control of it through intergovernmental organizations. Alternatively, governments could become motivated to break away from the one, unified Internet to form their own national or regional networks, essentially fragmenting the Internet we know today. The result of this could be a patchwork of incompatible networks spread across different nation states, with long-term social, cultural, political and economic casualties. Why take that chance?

The ICANN multi-stakeholder community brings together thousands of representatives from large and small businesses and civil society with technical experts, researchers, academics and end users from all over the world. Our role at ICANN is to coordinate this community. We are neutral and independent facilitators.

Many stakeholders have been working tirelessly over the past year to meet NTIA’s guidelines for the transition of their stewardship role to the global multi-stakeholder community. Since March 2014, the community has spent more than 400 hours together on calls and in meetings, working to develop a proposal that meets the following guidelines:

• Supports and enhances the existing multi-stakeholder model.

• Maintains the security, stability and resiliency of the Internet Domain Name System.

• Meets the needs and expectations of the global customers and partners of the IANA services.

• Maintains the openness of the Internet.

They also have to take into account that NTIA also specified that it would not accept a proposal that replaces NTIA’s role with a government-led or intergovernmental organization solution.

Should the transition fail, the United States could lose credibility in its quest to maintain an open, multi-stakeholder-driven Internet. The risk of fragmentation will grow and U.S. and global economies risk losing the commercial and social benefits inherent in the single, global, free and open Internet where innovation happens, and on which we’ve all come to rely.

I invite you to please join our process. If you have concerns, voice them. If you agree with the fundamental principles the proposal is based on, share that. Engage with the multi-stakeholder community and share your thoughts and opinions. It is critical to the success of our effort and the future of the Internet that we have as much participation in the process as possible.

Fadi Chehadé is the president and CEO of ICANN, a not-for-profit, public benefit corporation with participants from all over the world dedicated to keeping the Internet secure, stable and interoperable. He will be speaking on a session at the Techonomy Policy conference June 9 on the Worrisome Future of the Internet.

To attend, you can register here. Original article published at Techonomy.com.
http://www.huffingtonpost.com/techonomy/a-critical-moment-for-the_b_7513308.html

Posted in NetHappenings | Tagged , , , , , , , ,

The USA FREEDOM Act, the President’s Review Group and the Biggest Intelligence Reform in 40 Years

The USA FREEDOM Act, the President’s Review Group and the Biggest Intelligence Reform in 40 Years

https://privacyassociation.org/news/a/the-usa-freedom-act-the-presidents-review-group-and-the-biggest-intelligence-reform-in-40-years/

 

Two years after the first story based on Edward Snowden’s leaks hit the press, the U.S. government enacted the USA FREEDOM Act, ending bulk collection under Section 215. As one of five members of President Obama’s Review Group on Intelligence and Communications Technology, I applaud its passage—the biggest pro-privacy change to U.S. intelligence law since the original enactment of the Foreign Intelligence Surveillance Act in 1978.

There is a close fit between the Review Group’s work and the new law as well as multiple significant reform measures the Obama administration has already adopted without legislative change. In this era of partisan gridlock, the U.S. system of government has proved more responsive and resilient than many skeptics had predicted.

<snip>

Posted in NetHappenings | Tagged , , , , , , , , , , ,

US Dept of Commerce seeks comments on proposed export changes

The Wassenaar Arrangement (full name: The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies) is a multilateral export control regime (MECR) with 41 participating states including many former COMECON (Warsaw Pact) countries.

An FRN issued on 5/20/2015

https://www.federalregister.gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary-agreements-implementation-intrusion-and-surveillance-items

describes a proposal by Department of Commerce’s Bureau of Industry and Security (BIS) for a license requirement for the export, reexport, or transfer (in-country) of systems, equipment or components specially designed for the generation, operation or delivery of, or communication with, intrusion software; software specially designed or modified for the development or production of such systems, equipment or components; software specially designed for the generation, operation or delivery of, or communication with, intrusion software; technology required for the development of intrusion software; Internet Protocol (IP) network communications surveillance systems or equipment and test, inspection, production equipment, specially designed components therefor, and development and production software and technology therefor.

The FRN notes that BIS is seeking information about the effect of this rule and would appreciate the submission of comments, and especially answers to the following questions:

1. How many additional license applications would your company be required to submit per year under the requirements of this proposed rule? If any, of those applications:
a. How many additional applications would be for products that are currently eligible for license exceptions?
b. How many additional applications would be for products that currently are classified EAR99?

2. How many deemed export, reexport or transfer (in-country) license applications would your company be required to submit per year under the requirements of this rule?

3. Would the rule have negative effects on your legitimate vulnerability research, audits, testing or screening and your company’s ability to protect your own or your client’s networks? If so, explain how.

4. How long would it take you to answer the questions in proposed paragraph (z) to Supplement No. 2 to part 748? Is this information you already have for your products?

* The ADDRESSES section of this proposed rule includes information about how to submit comments.

Posted in NetHappenings | Tagged , , , , , , , , ,